• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,145
Next 10 →

Information Hiding -- A Survey

by Fabien A. P. Petitcolas, Ross J. Anderson, Markus G. Kuhn , 1999
"... Information hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number or even help to prevent unauthorised ..."
Abstract - Cited by 280 (0 self) - Add to MetaCart
Information hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number or even help to prevent unauthorised

Multimedia Watermarking Techniques

by Frank Hartung, Martin Kutter , 1999
"... ..."
Abstract - Cited by 341 (5 self) - Add to MetaCart
Abstract not found

Reversible Authentication Watermark for Image

by Xiaoping Liang , 2008
"... Reversible (invertible, lossless) authentication draws much attention recently for its ability to restore the original image from marked image without any distortions upon verification. In this paper, we propose a reversible watermarking scheme for image authentication based on histogram modificatio ..."
Abstract - Add to MetaCart
Reversible (invertible, lossless) authentication draws much attention recently for its ability to restore the original image from marked image without any distortions upon verification. In this paper, we propose a reversible watermarking scheme for image authentication based on histogram

Reversible data hiding

by Zhicheng Ni, Yun-qing Shi, Nirwan Ansari, Wei Su - IEEE Trans. Circuits Syst. Video Technol , 2006
"... Abstract—A novel reversible data hiding algorithm, which can recover the original image without any distortion from the marked image after the hidden data have been extracted, is presented in this paper. This algorithm utilizes the zero or the minimum points of the histogram of an image and slightly ..."
Abstract - Cited by 123 (4 self) - Add to MetaCart
the original image is guaranteed to be above 48 dB. This lower bound of PSNR is much higher than that of all reversible data hiding techniques reported in the literature. The computational complexity of our proposed technique is low and the execution time is short. The algorithm has been successfully applied

Vigilante: End-to-End Containment of Internet Worm Epidemics

by Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham , 2008
"... Worm containment must be automatic because worms can spread too fast for humans to respond. Recent work proposed network-level techniques to automate worm containment; these techniques have limitations because there is no information about the vulnerabilities exploited by worms at the network level. ..."
Abstract - Cited by 299 (6 self) - Add to MetaCart
Worm containment must be automatic because worms can spread too fast for humans to respond. Recent work proposed network-level techniques to automate worm containment; these techniques have limitations because there is no information about the vulnerabilities exploited by worms at the network level

Robust Content Authentication/Watermarking

by Prof Shih-fu Chang, Part I
"... content management exchange ..."
Abstract - Add to MetaCart
content management exchange

Data Hiding in Binary Images for Authentication and Annotation

by Min Wu, Bede Liu - IEEE Trans. on Multimedia , 2004
"... Abstract—This paper proposes a new method to embed data in binary images, including scanned text, figures, and signatures. The method manipulates “flippable ” pixels to enforce specific blockbased relationship in order to embed a significant amount of data without causing noticeable artifacts. Shuff ..."
Abstract - Cited by 54 (7 self) - Add to MetaCart
embedding method can be used to detect unauthorized use of a digitized signature, and annotate or authenticate binary documents. The paper also presents analysis and discussions on robustness and security issues. Index Terms—Annotation, authentication, binary image, data hiding, digital watermarking. I.

Data-Hiding Codes

by Pierre Moulin, Ralf Koetter - Proc. IEEE , 2005
"... This tutorial paper reviews the theory and design of codes for hiding or embedding information in signals such as images, video, audio, graphics, and text. Such codes have also been called watermarking codes; they can be used in a variety of applications, including copyright protection for digital m ..."
Abstract - Cited by 56 (4 self) - Add to MetaCart
This tutorial paper reviews the theory and design of codes for hiding or embedding information in signals such as images, video, audio, graphics, and text. Such codes have also been called watermarking codes; they can be used in a variety of applications, including copyright protection for digital

Multimedia Data Hiding

by Min Wu - in Digital Binary Image,” IEEE Int. Conf. Multimedia and Expo, ICME’00 , 2002
"... The digital information revolution has brought about profound changes in our society and our lives. The many advantages of digital information have also generated new challenges and new opportunities for innovation. This thesis discusses the issues regarding multimedia data hiding and its applicatio ..."
Abstract - Cited by 53 (15 self) - Add to MetaCart
The digital information revolution has brought about profound changes in our society and our lives. The many advantages of digital information have also generated new challenges and new opportunities for innovation. This thesis discusses the issues regarding multimedia data hiding and its

Stereo Image Reversible Watermarking

by J. N. Ellinas
"... Abstract – In this paper, a new reversible watermarking method is presented that reduces the size of a stereoscopic image pair while keeping its content visible. The proposed technique embeds the disparity compensated difference and the disparity vectors of the stereo pair into the reference image, ..."
Abstract - Add to MetaCart
Abstract – In this paper, a new reversible watermarking method is presented that reduces the size of a stereoscopic image pair while keeping its content visible. The proposed technique embeds the disparity compensated difference and the disparity vectors of the stereo pair into the reference image
Next 10 →
Results 1 - 10 of 2,145
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University